SIEM as a Service
HPE Alerts Employees of Data Breach

HPE Alerts Employees of Data Breach After Russian Cyberattack on Office 365

Hewlett Packard Enterprise (HPE) has disclosed a significant data breach involving its Office 365 email environment, attributed to the Russian state-sponsored hacking group known as Midnight Blizzard, also referred to as Cozy Bear or...

DeepSeek Database Leaked – Full Control Over DB Secret keys, Logs & Chat History...

A security vulnerability in DeepSeek, a prominent Chinese AI startup, exposed a publicly accessible ClickHouse database containing highly sensitive information, including over a million lines of log streams. The breach, which included chat logs, API...
What Is The Current State Of IoT Security?

What Is The Current State Of IoT Security?

The Internet of Things (IoT) continues to expand, embedding itself into more sectors than ever before. With its growth, however, comes increased risk and exposure to security threats. Recent reports highlight the pressing need...
New NAND Chip Attack Lets Attackers Uncover Secrets And Reverse Engineer Products

New NAND Chip Attack Lets Attackers Uncover Secrets And Reverse Engineer Products

A new hardware hacking technique targeting NAND flash memory chips has emerged, allowing attackers to extract sensitive data and reverse engineer products at a surprisingly low cost. This "chip-off" attack involves physically removing the...
Critical OneDev DevOps Platform Vulnerability Allows Unauthorized Access To Sensitive Data

Critical OneDev DevOps Platform Vulnerability Let Attacker Read Sensitive Data

A critical vulnerability has been identified in the OneDev DevOps platform, posing significant security risks to organizations relying on this tool for their software development and deployment processes. The issue, tracked as CVE-2024-45309, affects versions...
Microsoft Recall New Security Features

Microsoft Updates Recall Security Architecture Amid Controversy

In a move to address growing concerns over privacy and security, Microsoft has unveiled significant updates to the security architecture of its Recall feature, an AI-powered tool designed to help users find what they've...
Discord Launches End-To-End Encryption For Audio And Video Chats

Discord Launches End-To-End Encryption For Audio & Video Chats

Discord has announced the rollout of end-to-end encryption (E2EE) for audio and video chats on its platform. This new feature dubbed the DAVE protocol, ensures that only the participants in a call can access the...
Revolutionizing Cloud Security With Zero Trust Architecture : A New Era Of Cyber Defense

Revolutionizing Cloud Security With Zero Trust Architecture : A New Era Of Cyber Defense

It is not a secret that cloud computing is among the most valuable components for a 2024 operational business. O-Reilly conducted a study, and from their report, more than 90% of businesses and organizations...
Researches introduced MaskAnyone Toolkit To Minimize The Privacy Risks

Researches Introduced MaskAnyone Toolkit To Minimize The Privacy Risks

Audio-visual data offers invaluable insights into human behavior and communication but raises significant privacy concerns, which proposes MaskAnyone, a toolkit for de-identifying individuals in audio-visual data while preserving data utility.  By combining face-swapping, auditory masking,...
Secure Online Payments — 10 Ways To Make E-commerce Payments Secure For Business

Secure Online Payments — 10 Ways To Make E-commerce Payments Secure For Business

With the increasing popularity of online shopping, the safety and security of online transactions are critical for both customers and companies. In 2024, e-commerce is estimated to account for around 22% of total worldwide...
SIEM as a Service

Recent Posts

Beware of Malicious Browser Updates That Installs SocGholish Malware

Cyber threats have evolved significantly in recent years, with malicious actors employing sophisticated tactics to compromise user systems. One such threat is the SocGholish malware,...